2010 5th International Symposium on Telecommunications最新文献

筛选
英文 中文
Intelligent cross-layer adaptation scheme for wireless links with QoS-guaranteed traffic 面向qos流量保证无线链路的智能跨层自适应方案
2010 5th International Symposium on Telecommunications Pub Date : 2010-12-01 DOI: 10.1109/ISTEL.2010.5734057
Younes Abdi, P. Azmi
{"title":"Intelligent cross-layer adaptation scheme for wireless links with QoS-guaranteed traffic","authors":"Younes Abdi, P. Azmi","doi":"10.1109/ISTEL.2010.5734057","DOIUrl":"https://doi.org/10.1109/ISTEL.2010.5734057","url":null,"abstract":"Quality-of-service (QoS)-guaranteed traffic is of critical importance in real-time multimedia communications. In this paper, a novel approach to systematic cross-layer monitoring, learning, and optimization using artificial neural networks is developed for wireless links with QoS-guaranteed traffic. The proposed method is used to jointly optimize the design parameters of the adaptive modulation and coding (AMC) scheme at the physical layer with the truncated automatic repeat request (ARQ) protocol at the data link layer. The structure, performance, and cooperation of the artificial neural networks used in the proposed adaptive system are disclosed in detail and the capability of the proposed method in maximizing the overall system throughput and maintaining the QoS guarantees in non-stationary wireless links is discussed and verified by a set of illustrative simulation results.","PeriodicalId":306663,"journal":{"name":"2010 5th International Symposium on Telecommunications","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131594026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Robust image watermarking based on multiwavelet parent-child relation and adaptive support vector regression 基于多小波父子关系和自适应支持向量回归的鲁棒图像水印
2010 5th International Symposium on Telecommunications Pub Date : 2010-12-01 DOI: 10.1109/ISTEL.2010.5734142
Hamed Ghodrati, H. Danyali
{"title":"Robust image watermarking based on multiwavelet parent-child relation and adaptive support vector regression","authors":"Hamed Ghodrati, H. Danyali","doi":"10.1109/ISTEL.2010.5734142","DOIUrl":"https://doi.org/10.1109/ISTEL.2010.5734142","url":null,"abstract":"In this paper, a robust image watermarking algorithm in multiwavelet domain is proposed. Multiwavelet transform provides good energy compaction and trade off between imperceptibility and watermark robustness properly. In the proposed algorithm, after performing a three-level multiwavelet decomposition, a parent-child relationship is defined between coefficients in different subbands. To increase the robustness, the relationship between the root node and its offspring nodes is learnt by support vector regression (SVR) and then the watermark is embedded and extracted based on this inherent relation. The good energy compaction property of multiwavelet can cause small number of coefficients containing most of image energy, therefore the range of target output values of SVR is extended which notably made inaccuracy in predictions. In order to overcome this problem, we proposed a procedure, which applies the inputs to SVR in an adaptive way. The experimental results show, the proposed algorithm possesses acceptable perceptual quality, while it is robust against common attacks such as JPEG, low-pass filtering, noise addition, cropping and resizing, etc.","PeriodicalId":306663,"journal":{"name":"2010 5th International Symposium on Telecommunications","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131820135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modification of the relative distance for free text keystroke authentication 修改相对距离为自由文本击键认证
2010 5th International Symposium on Telecommunications Pub Date : 2010-12-01 DOI: 10.1109/ISTEL.2010.5734085
H. Davoudi, E. Kabir
{"title":"Modification of the relative distance for free text keystroke authentication","authors":"H. Davoudi, E. Kabir","doi":"10.1109/ISTEL.2010.5734085","DOIUrl":"https://doi.org/10.1109/ISTEL.2010.5734085","url":null,"abstract":"Unlike many other biometrics, keystroke authentication does not require any additional hardware. Pressing time of keystrokes is the main source of information and can be extracted continuously during an ongoing session, even after the login time. The relative distance, which is a common measure in this field, is defined based on the relative typing speed of different digraphs. To improve the accuracy of authentication based on this measure, we propose to assign a weight to each digraph depending on its typing speed reliability; this expands the effectiveness of reliable digraphs in distance computation. The proposed method is tested on 315 typing samples of 21 users. The results show that our method will improve the accuracy in both forms of FAR and FRR measures.","PeriodicalId":306663,"journal":{"name":"2010 5th International Symposium on Telecommunications","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126576345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
LayeredCast - a hybrid Peer-to-Peer live layered video streaming protocol LayeredCast -一个混合点对点直播分层视频流协议
2010 5th International Symposium on Telecommunications Pub Date : 2010-12-01 DOI: 10.1109/ISTEL.2010.5734106
M. Moshref, R. Motamedi, H. Rabiee, M. Khansari
{"title":"LayeredCast - a hybrid Peer-to-Peer live layered video streaming protocol","authors":"M. Moshref, R. Motamedi, H. Rabiee, M. Khansari","doi":"10.1109/ISTEL.2010.5734106","DOIUrl":"https://doi.org/10.1109/ISTEL.2010.5734106","url":null,"abstract":"Peer-to-Peer overlay networks are an attractive foundation for video streaming. However, live Peer-to-Peer media streaming systems face many challenges such as bandwidth heterogeneity, node churn, and selfish nodes. Although many tree based and mesh based streaming protocols have been proposed, each has its own drawbacks such as unreliability and unfairness in tree based and long startup delay and complex scheduling in mesh based protocols. In this paper, we propose a new video streaming protocol called LayeredCast main features of which are: 1) Hybrid: Drawbacks of the simple approaches are compensated using a hybrid of mesh and tree overlays. 2) Layered Video: Provides an adaptive scheme to enhance the video quality using a layered video codec for heterogeneous clients. 3) QoS: LayeredCast scheduling aims at moving complexity of Multi-Service network core to the network clients application layer, thus providing better QoS over simple regular networks. LayeredCast's tree network pushes the base layer to all peers while the enhancement layers and missing base layer segments are pulled over a mesh network by peers with extra bandwidth using a new data-driven scheduling scheme. We have evaluated the performance of LayeredCast on an innovative simulation framework. Simulation results verify better performance of LayeredCast in term of decodable video frames over CoolStreaming, especially when network resources are limited.","PeriodicalId":306663,"journal":{"name":"2010 5th International Symposium on Telecommunications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131021277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Adaptive and quantitative comparison of J2EE vs. .NET based on attack surface metric 基于攻击面度量的J2EE与。net的自适应定量比较
2010 5th International Symposium on Telecommunications Pub Date : 2010-12-01 DOI: 10.1109/ISTEL.2010.5734024
S. Nasiri, R. Azmi, R. Khalaj
{"title":"Adaptive and quantitative comparison of J2EE vs. .NET based on attack surface metric","authors":"S. Nasiri, R. Azmi, R. Khalaj","doi":"10.1109/ISTEL.2010.5734024","DOIUrl":"https://doi.org/10.1109/ISTEL.2010.5734024","url":null,"abstract":"Development platforms have an important role in software's development and production. Prior work has shown that a system's attack surface measurement serves as a reliable proxy for security of similar software systems. A key challenge in attack surface measurement method is the estimation of the damage potential ratio. In our approach, it is applied Common Vulnerability Scoring System (CVSS) as a reliable metrics than the prior work. We show that, the attack surface of .NET platform is less than J2EE. Since only part of development environment is applied, so measuring the actual attack surface is depended on usage.","PeriodicalId":306663,"journal":{"name":"2010 5th International Symposium on Telecommunications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133564764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance analysis of opportunistic frequency diversity strategy in cognitive radio systems 认知无线电系统中机会频率分集策略的性能分析
2010 5th International Symposium on Telecommunications Pub Date : 2010-12-01 DOI: 10.1109/ISTEL.2010.5733989
M. Ghaznavi, A. Jamshidi
{"title":"Performance analysis of opportunistic frequency diversity strategy in cognitive radio systems","authors":"M. Ghaznavi, A. Jamshidi","doi":"10.1109/ISTEL.2010.5733989","DOIUrl":"https://doi.org/10.1109/ISTEL.2010.5733989","url":null,"abstract":"Cognitive radio is a new technology that solves the problem of spectrum scarcity. In this technology, secondary users, users that do not have license to use the spectrum, can access the frequency bands that are idle in time or frequency whenever the primary users (PUs), users that have license to access the spectrum, are not using these bands. So, cognitive radio networks improve the spectrum utilization. In this paper, with the assumption that the secondary users operate in a wideband communication system, first the bandwidth of the system is divided into some equal parts that are larger than the coherent bandwidth of the channel, and then the capacity of the channel by considering the secondary user's outage capacity criteria is compared in two structures: one with the use of frequency diversity technique and other without the use of frequency diversity.","PeriodicalId":306663,"journal":{"name":"2010 5th International Symposium on Telecommunications","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128843614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Object detection with novel shape representation using bounding edge fragments 基于边界碎片的新型形状表示的目标检测
2010 5th International Symposium on Telecommunications Pub Date : 2010-12-01 DOI: 10.1109/ISTEL.2010.5734140
Mohammad Anvaripour, H. Ebrahimnezhad
{"title":"Object detection with novel shape representation using bounding edge fragments","authors":"Mohammad Anvaripour, H. Ebrahimnezhad","doi":"10.1109/ISTEL.2010.5734140","DOIUrl":"https://doi.org/10.1109/ISTEL.2010.5734140","url":null,"abstract":"This paper proposes a new method to detect objects in images. Boundaries contain shape of the objects. To detect objects in cluttered images, we use boundary fragments. Boundary fragments are obtained by our new training procedure. Poisson equation is used to divide edges and extract generic model of the object. Gaussian Mixture Model (GMM) is used to model shape of the object. This creates relation between local boundary fragments. To localize our desired object in image, a voting process is performed in Hough space. A scale adaptive search algorithm is used in this voting space to find the most probable regions of object presence. By learned GMM, shape of the object is obtained from test image. We remove false positives, usual problems in object detection tasks, by matching generic model to the extracted shapes. Local orientations histograms of the objects model are used for matching. We evaluate our method and compare with state-of-the-art methods. Experimental results show the power of our proposed method in detection and its robustness in face to scale and translation variations.","PeriodicalId":306663,"journal":{"name":"2010 5th International Symposium on Telecommunications","volume":"674 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133817315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Ontology-based fuzzy web services clustering 基于本体的模糊web服务聚类
2010 5th International Symposium on Telecommunications Pub Date : 2010-12-01 DOI: 10.1109/ISTEL.2010.5734117
N. Gholamzadeh, F. Taghiyareh
{"title":"Ontology-based fuzzy web services clustering","authors":"N. Gholamzadeh, F. Taghiyareh","doi":"10.1109/ISTEL.2010.5734117","DOIUrl":"https://doi.org/10.1109/ISTEL.2010.5734117","url":null,"abstract":"Web services are the most important event in distributed computing today and have achieved great popularity among software developers. A critical step in the process of developing applications based on web services is web service discovery, i.e., the identification of existing web services that can potentially be used in the context of a new web application.","PeriodicalId":306663,"journal":{"name":"2010 5th International Symposium on Telecommunications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124195603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Distributed power allocation based on coalitional and noncooperative games for wireless networks 基于联合与非合作博弈的无线网络分布式功率分配
2010 5th International Symposium on Telecommunications Pub Date : 2010-12-01 DOI: 10.1109/ISTEL.2010.5734054
H. Khayatian, R. Saadat, G. Mirjalily
{"title":"Distributed power allocation based on coalitional and noncooperative games for wireless networks","authors":"H. Khayatian, R. Saadat, G. Mirjalily","doi":"10.1109/ISTEL.2010.5734054","DOIUrl":"https://doi.org/10.1109/ISTEL.2010.5734054","url":null,"abstract":"The performance in cooperative communication depends on careful resource allocation such as relay selection and power Control. This paper introduces novel concepts for relay selection schemes based on coalitional game theory which establishes the dynamic formation of coalitions in multi user wireless networks. Then we present a power allocation for wireless data transmission among coalition based on a noncooperative game. Through this games theoretical framework, source nodes are able to self organize and form a stable coalitions and set their transmission powers in a completely distributed manner. Numerical results denote that the proposed algorithm achieves significant reduction in energy consumption and improvement in payoff for the users, compared to noncooperative power control approaches.","PeriodicalId":306663,"journal":{"name":"2010 5th International Symposium on Telecommunications","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124282729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Robust facial 2D motion model estimation for 3D head pose extraction and automatic camera mouse implementation 鲁棒面部二维运动模型估计三维头部姿态提取和自动相机鼠标实现
2010 5th International Symposium on Telecommunications Pub Date : 2010-12-01 DOI: 10.1109/ISTEL.2010.5734135
Masoomeh Nabati, A. Behrad
{"title":"Robust facial 2D motion model estimation for 3D head pose extraction and automatic camera mouse implementation","authors":"Masoomeh Nabati, A. Behrad","doi":"10.1109/ISTEL.2010.5734135","DOIUrl":"https://doi.org/10.1109/ISTEL.2010.5734135","url":null,"abstract":"In this paper, we present a novel approach to 3D head pose estimation from monocular camera images for the control of mouse pointer movements on the screen and clicking events. This work is motivated by the goal of providing a non-contact instrument to control the mouse pointer on a PC system for handicapped people with severe disabilities using low-cost and widely available hardware. The required information is derived from video data captured using a monocular web camera mounted on the computer monitor. Our approach proceeds in six stages. First, the face area is extracted using Haar-like features and AdaBoost algorithm. Second, the locations of the point features are detected and tracked over video frames by LK algorithm. Third, the 2D transformation model between consecutive frames is estimated by matching features and robust RANSAC algorithm. Fourth, the estimated 2D transformation model is applied to four supposed points on the face area. Then, the 3D rotation matrix and translation vector between the web camera and 3D head pose are estimated using four points correspondences. Finally, the 3D rotation and translation matrix is applied for estimating the mouse pointer movements on the PC screen and clicking events. Experimental results showed the promise of the algorithm.","PeriodicalId":306663,"journal":{"name":"2010 5th International Symposium on Telecommunications","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124326297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信